Cloud Based Application 6 ITECH 5500 Professional Research and Communication Lecturer: Ms. Susan Lee RESEARCH PROPOSAL Cloud Assisted Human-Centered Applications Based On Wearable Computing Devices...

You have to make 10-12 slides of ppt on the basis of given files.you must include the topics which i have given in format research word file.and follow rubric( pdf).


Cloud Based Application6 ITECH 5500 Professional Research and Communication Lecturer: Ms. Susan Lee RESEARCH PROPOSAL Cloud Assisted Human-Centered Applications Based On Wearable Computing Devices Student Name: Ishani Shah Student Id:30360118 Email: [email protected] Date of submission:17/04/2019 Contents 1.Proposal:3 1.1 Background3 1.2 Problem with security3 1.3 Limitation of wearable devices4 1.3 Aim of this study4 2.Article overview:4 3.Synthesis Matrix from literature review6 4. References:9 1.Proposal: 1.1 Background Cloud assisted human-centered applications are the applications that work on internet, gets saved on internet, and work with the components that are locally based on the organization it is working for. This is based on the servers that are remote in working and is accessed from a browser. With the development in the internet and the computers these cloud based applications are gaining much importance. The people can wear the devices like watches, glares, shoes or even clothes and can run this application on these wearable devices. These devices are easy to carry and easy to operate as they come with easy installation and very easily they fit on the computing devices. This is the age where everything depends on the computer technologies and internet, and for making our life easier this cloud based computing devices are using the IoT and using the internet for serving the applications. In the past 10 years these cloud based applications have gained a lot of importance. Example e-mail has made life of human much easier and this can be operated from anywhere, anytime on wearable computing devices like watches etc. These devise helps to faster cater the needs of business, all operations are really simplified. In totality these devices with the applications have made the easy going working of the humans. 1.2 Problem with security Security: If left unattended, wearable era can reason numerous safety problems as it could be hacked effortlessly. Wearable computer systems are linked to the organization's server to permit smooth float of communique among human beings out within the field and their opposite numbers inside the office. However, if now not tackled carefully, then the outer source can use this facts to either scouse borrow enterprise or non-public secrets and techniques. 1.3 Limitation of wearable devices Expensive: Sophistication comes with rate because it calls for high tiers of era to give you wearable computer systems making the quit product highly-priced and lavish to many. Discomfort: Wearable gadgets generally tend to annoy the consumer on the time of warm and humid weather situations as those wearable components emit heat regardless of the cooling technology built in in them. It additionally effects in health hazards inclusive of headache and dizziness. 1.4 Aim of this study This study aims to elicit insights approximately sustainable wearable with the aid of investigating recent advancements in wearable era and their programs. Wearable era has superior extensively from a technical attitude, but it has stagnated due to barriers with out penetrating wider society in spite of early wonderful expectancies. This situation is the incentive behind the point of interest on research with the aid of many research agencies in recent years into wearable programs which could provide the nice price from a human-orientated attitude. The expectation is that a new way to resolve the difficulty can be determined from a perspective of sustainability; that is the main point of this paper. This study first specializes in the trend of wearable generation like bodily reputation tracking, multi-wearable device manipulate, and smart networking between wearable sensors. 2.Article overview: Article No. 1: Wearable computing and its applications The author Smita Jhajharia in the article is focusing on the importance of cloud based applications that these devices can be prove to be an opportunity for people and bring out the imagination of people from various fields. These applications are helpful for the defense services in the maintenance of aircraft and designing of the military equipment’s, the benefit of wearable devices is that it could be carried anywhere to an ease and cam help in the production of various equipment’s in the defense industry with the help of the cloud based applications. The limitation of the paper is that it focus only a small place and does not go beyond that (Jhajharia, 2014). Article No. 2: Cloud-based Activity-aaService cyber–physical framework for human activity monitoring in mobility The author Raffaele Gravina, in her article is focusing on the physical security through the cloud human centered applications in the wearable devices. These devices based on the cloud are a good source of security, as these devices are sensor based and can be controlled through the wearable devices. Companies can use these devices to analyze the data and the work flow in the organization individually. Prototyping has become easy through the use of such devices, every company wants to build and have the prototypes of the main devices, building these prototypes is a costly affair and through the cloud based application this has become easy (Gravina, 2017). Article No. 3: Cloud-aided lightweight certificate less authentication protocol with anonymity for wireless body area networks Here Jian Shen, is making the people aware about the various benefits of computing devices that can be wear, working on the cloud based application. These devices require internet every time and can save the work done online. The work done or pictures saved through cloud based application can be viewed any time on any internet running devices, saving the efforts or the time of humans. These devices are now used in the health care services through which just by wearing the devices by the patients, the whole body checkup report is analyzed. The big machines are getting smaller by using the cloud based applications (Shen, 2018). Article No. 4: Green Cognitive Body Sensor Network: Architecture, Energy Harvesting and Smart Clothing based Applications According to Yiming Miao, this era is the era of smart clothing where devices are installed on the clothing or the accessories of the humans, and through these devices the human can remain in touch with the whole world through internet running on their clothes or accessories. The architects are getting help through these devices as now they don’t have to carry their whole lot of things to demonstrate the building and its designing, only they need to carry themselves with the wearable cloud based applications on it and the work is easily done. The only limitation in the paper is that it has researched only a fewer architects and hence the result is based on few opinions (Miao, 2018). 3.Synthesis Matrix from literature review Synthesis Matrix Authors Area where IT has been using Benefits Negative impact Solution Limitation Smita Jhajharia Defence Services Security Provided and production in equipment’s This security can be hacked if the application is not protected Security measures should be taken for the applications cloud based The research was made only on few people from the defence department Raffaele Gravina Private Companies Prototyping is becoming easy The idea behind the prototypes can be hacked Password protection should be used Focus was given to only the some private companies Jian Shen Health Care Sectors Easy check-up of patients Costly and if not accessed properly output can be wrong Devices should be properly handled and the result should be checked twice Only conducted on few hospitals and clinics. Yiming Miao Architectural organizations Demonstrations of the designing on cloud applications Difficult to understand and costly The manuals should be focused properly Research was only based on interview and real implementation was not conducted. 4. References: Gravina, R. (2017). Cloud-based Activity-aaService cyber–physical framework for human activity monitoring in mobility. Future Generation Computer Systems, 75, 158-171. Retrieved from https://www.sciencedirect.com/science/article/pii/S0167739X16303016 Jhajharia, S. (2014). Wearable Computing and its Application. International Journal Of Computer Science And Information Technologies, 5(4). Retrieved from https://www.researchgate.net/publication/306322945_Wearable_Computing_and_its_Application Miao, Y. (2018). Green Cognitive Body Sensor Network: Architecture, Energy Harvesting and Smart Clothing based Applications. IEEE Sensors Journal. Retrieved from https://ieeexplore.ieee.org/abstract/document/8466664 Shen, J. (2018). Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. Journal Of Network And Computer Applications, 106, 117-123. Retrieved from : https://www.sciencedirect.com/science/article/pii/S1084804518300031 Requirement slides: Content slide Aim of the study Background Literature review Methodology Expected outcomes Ethics References: APA referencing CRICOS Provider No. 00103D itech5500 research presentation assignment.docx Page 1 of 3 Task: Present Interim research proposal Due Date: Week 8 (in timetable lecture and/or tutorial) (As scheduled by course Lecturer) Worth: 5% Objectives The purpose of this assignment is to enable students to present their proposal to the tutor and class. Background Being able to present your research to an audience is a key skill for researchers to develop. There are a variety of different settings where you may be asked to do this, from the school or faculty research seminar to the international conference. Presentations sometimes take the form of posters as well as talks. It is important that every presentation take account of whom the audience is. A seminar delivered to an interdisciplinary audience which may have no specialist knowledge of your field will be very different to a conference presentation in front of learned specialists – even if you are presenting essentially the same research at both venues. For assistance in giving oral presentations, see: http://federation.edu.au/future-students/study-at- feduni/student-support/student-futures-program/study-skills/oral-presentations Requirements Each student is required to present an oral presentation or seminar of his/her research proposal. This presentation is expected to take 5 minutes, with an additional 2 minutes for questions and comments from the audience. You are required to use presentation software (PowerPoint or so) for the purpose of this presentation. This assessment gives the student an opportunity to demonstrate the key aspects of their proposal to an audience and also to receive feedback. The following topics should be covered. • Introduction: o Background, context, overview o Purpose of the study • Summary of Research Questions and Purpose: o Research questions, aims, hypotheses that are clear and specific o Definition of the paradigm and methodology chosen for the study, including the rationale for the choice; introduction to conceptual or theoretical framework • Summary of Relevant Literature: o Current, balanced, relevant, significant ITECH 5500 Professional Research & Communication http://federation.edu.au/future-students/study-at-feduni/student-support/student-futures-program/study-skills/oral-presentations http://federation.edu.au/future-students/study-at-feduni/student-support/student-futures-program/study-skills/oral-presentations CRICOS Provider No. 00103D itech5500 research presentation assignment.docx Page 3 of 3 o Extensive • Summary of Methods, Methodology and Data Collection: o Variables used and relations between variables o Data collection and measurement tools • Summary of any other considerations/aspects of the research, e.g., [OHS/Safety and/or Ethics] ITECH5500 Present Interim Proposal - Marking Rubric Student Id. Student Name Category Excellent Good Acceptable Poor/Unacceptable Marks Proposal quality 4-5 Clear research problem. Coherent proposal 3
May 07, 2021ITECH5500
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here